[
Abidah, L. (2022). Critical discourse analysis of Kamala Harris’s judgment on Trump’s handling over pandemic in president election campaign of the United States 2020. In Proceedings of International Conference on Language Pedagogy (ICOLP, Vol. 2, No. 1, pp. 170–174).
]Search in Google Scholar
[
Baroni, M., & Evert, S. (2009). Statistical methods for corpus exploitation. In A. Ludeling & M. Kyto (Eds.), Corpus linguistics: An international handbook volume 2 (pp. 777–802). De Gruyter Mouton.
]Search in Google Scholar
[
Bednarek, M. (2008). Emotion talk across corpora. Palgrave MacMillan.
]Search in Google Scholar
[
Bellz, J. A. (2003). Linguistic perspectives on the development of intercultural competence in telecollaboration. Language Learning & Technology, 7(2), 68–117. http://dx.doi.org/10125/25201
]Search in Google Scholar
[
Belur, J., Tompson, L., Thornton, A., & Simon, M. (2021). Interrater reliability in systematic review methodology: Exploring variation in coder decision- -making. Sociological Methods & Research, 50(2), 837–865. https://doi.org/10.1177/0049124118799372
]Search in Google Scholar
[
Braun, V., & Clarke, V. (2019). Novel insights into patients’ life-worlds: The value of qualitative research. The Lancet Psychiatry, 6(9), 720–721. https://doi.org/10.1016/S2215-0366(19)30296-2
]Search in Google Scholar
[
Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283. https://doi.org/10.1080/1068316X.2013.772180
]Search in Google Scholar
[
Budd, C., & Anderson, J. (2011). Consumer fraud in Australasia: Results of the Australasian consumer fraud taskforce online Australia surveys 2008 and 2009. Australian Institute of Criminology.
]Search in Google Scholar
[
Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408. https://doi.org/10.1177/0004865814521224
]Search in Google Scholar
[
Cambridge Dictionary (2015). Cambridge dictionaries online. Cambridge University Press.
]Search in Google Scholar
[
Charmaz, K. (2014). Constructing grounded theory (Introducing qualitative methods series, 2nd edition). Sage Publications.
]Search in Google Scholar
[
Chung, C., & Pennebaker, J. W. (2007). The psychological functions of function words. In K. Fielder (Ed.), Social communication (pp. 343–359). Taylor & Francis.
]Search in Google Scholar
[
Cramer, D. (2003). Acceptance and need for approval as moderators of self-esteem and satisfaction with a romantic relationship or closest friendship. The Journal of Psychology, 137(5), 495–505. https://doi.org/10.1080/00223980309600631
]Search in Google Scholar
[
Cross, C., & Layt, R. (2022). “I suspect that the pictures are stolen”: Romance fraud, identity crime, and responding to suspicions of inauthentic identities. Social Science Computer Review, 40(4), 955–973. https://doi.org/10.1177/0894439321999311
]Search in Google Scholar
[
DePaulo, B. M., Lindsay, J. J., Malone, B. E., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129(1), 74–118. https://psycnet.apa.org/doi/10.1037/0033-2909.129.1.74
]Search in Google Scholar
[
Dong, T., & Lin, X. (2018). Attitude in appraisal theory: A comparative analysis of English versions of Changgan Xing. International Journal of Comparative Literature and Translation Studies, 6(1), 42–49. https://doi.org/10.7575/aiac.ijclts.v.6n.1p.42
]Search in Google Scholar
[
Edwards, M., Suarez-Tangil, G., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2018). The geography of online dating fraud [Paper presentation]. Workshop on technology and consumer protection (ConPro), San Francisco, California, United States.
]Search in Google Scholar
[
Friedman, H. S., & Tucker, J. S. (1990). Language and deception. In H. Giles & W. P. Robinson (Eds.), Handbook of language and social psychology (pp. 257–270). John Wiley & Sons.
]Search in Google Scholar
[
Gabrielatos, C. (2018). Keyness analysis: Nature, metrics and techniques. In C. Taylor & A. Marchi, (Eds.), Corpus approaches to discourse: A critical review (pp. 225–258). Routledge.
]Search in Google Scholar
[
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
]Search in Google Scholar
[
Halliday, M. A. K., & Matthiessen, C. M. (2013). Halliday’s introduction to functional grammar. Routledge.
]Search in Google Scholar
[
Hancock, J. T., Curry, L., Goorha, S., & Woodworth, M. (2005). Automated linguistic analysis of deceptive and truthful synchronous computer-mediated communication. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA, 2005 (pp. 22c–22c). Institute of Electrical and Electronics Engineers.
]Search in Google Scholar
[
Hancock, J. T., Curry, L. E., Goorha, S., & Woodworth, M. (2007). On lying and being lied to: A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45(1), 1–23. https://doi.org/10.1080/01638530701739181
]Search in Google Scholar
[
Hancock, J. T., & Toma, C. L. (2009). Putting your best face forward: The accuracy of online dating photographs. Journal of Communication, 59(2), 367–386. https://doi.org/10.1111/j.1460-2466.2009.01420.x
]Search in Google Scholar
[
Hirschi, T. (1969). Causes of delinquency. University of California Press.
]Search in Google Scholar
[
Ho, S. M., & Hancock, J. T. (2019). Context in a bottle: Language-action cues in spontaneous computer mediated deception. Computers in Human Behavior, 91, 33–41. https://doi.org/10.1016/j.chb.2018.09.008
]Search in Google Scholar
[
Janowitz, M. (1975). Sociological theory and social control. American Journal of Sociology, 81(1), 82–108. https://doi.org/10.1086/226035
]Search in Google Scholar
[
Jensen, C., Hoben, M., Chamberlain, S. A., K. Marshall, S., Young, R. A., & Gruneir, A. (2022). Data analyses using the action project method coding technique: A guide. International Journal of Qualitative Methods, 21. https://doi.org/10.1177/16094069221108035
]Search in Google Scholar
[
Jong, K. (2019). Detecting the online romance scam: Recognising images used in fraudulent dating profiles. [University of Twente].
]Search in Google Scholar
[
Kopp, K., Layton, R., Sillitoe, J., & Gondal, I. (2015). The role of love stories in romance scams: A qualitative analysis of fraudulent profiles. International Journal of Cyber Criminology, 9(2), 205–217. https://doi.org/10.5281/ZENODO.56227
]Search in Google Scholar
[
Kopp, C., Sillitoe, J., Gondal, I., & Layton, R. (2016). The online romance scam: A complex two-layer scam. Journal of Psychological and Educational Research, 24(2), 144–161.
]Search in Google Scholar
[
Khosravi, M., & Babaii, E. (2017). Reply articles: Where impoliteness and judgment coincide. Journal of Politeness Research Language Behaviour Culture, 13(1), 143–167. https://doi.org/10.1515/pr-2015-0020
]Search in Google Scholar
[
Kvale, S., & Brinkmann, S. (2009). Interviews: Learning the craft of qualitative research interviewing. Sage.
]Search in Google Scholar
[
Lee, K. -F., Chan, M. Y., & Mohamad Ali, A. (2022). Self and desired partner descriptions in the online romance scam: A linguistic analysis of scammer and general user profiles on online dating portals. Crime Prevention and Community Safety, 25(1), 1–27. https://doi.org/10.1057/s41300-022-00169-7
]Search in Google Scholar
[
Lo, S.-K., Hsieh, A.-Y., & Chiu, Y.-P. (2013). Contradictory deceptive behavior in online dating. Computers in Human Behavior, 29(4), 1755–1762. https://doi.org/10.1016/j.chb.2013.02.010
]Search in Google Scholar
[
MacDonald, G., Saltzman, J. L., & Leary, M. R. (2003). Social approval and trait self-esteem. Journal of Research in Personality, 37(2), 23–40. https://doi.org/10.1016/S0092-6566(02)00531-7
]Search in Google Scholar
[
McEachrane, M. (2009). Emotion, meaning, and appraisal theory. Theory & Psychology, 19(1), 33–53. https://doi.org/10.1177/0959354308101418
]Search in Google Scholar
[
Markowitz, D. M., & Hancock, J. T. (2018). Deception in mobile dating conversations. Journal of Communication, 68(3), 547–569. https://doi.org/10.1093/joc/jqy019
]Search in Google Scholar
[
Martin, J. (2000). Beyond exchange: Appraisal systems in English. In S. Hunston & G. Thompson (Eds.), Evaluation in text: Authorial stance and the construction of discourse (pp. 142–175). Oxford University Press.
]Search in Google Scholar
[
Martin, J. R. (2004). Sense and sensibility: Texturing evaluation. In J. Foley (Ed.), Language, education and discourse: Functional approaches (pp. 270-304). Continuum.
]Search in Google Scholar
[
Martin, J. R., & White, P. R. R. (2005). The language of evaluation (Vol. 2). Springer.
]Search in Google Scholar
[
Modic, D., & Lea, S. E. (2013). Scam compliance and the psychology of persuasion. https://dx.doi.org/10.2139/ssrn.2364464
]Search in Google Scholar
[
Neuendorf, K. A. (2009). Reliability for content analysis. In A. B. Jordan, D. Kunkel, J. Manganello & M. Fishbein (Eds.). Media messages and public health: A decisions approach to content analysis (pp. 67–87). Routledge.
]Search in Google Scholar
[
Nhan, J., Kinkade, P., & Burns, R. (2009). Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation. International Journal of Cyber Criminology, 3(1), 452–475.
]Search in Google Scholar
[
Ngo, T., & Unsworth, L. (2015). Reworking the appraisal framework in ESL research: Refining attitude resources. Functional Linguistics, 2, 1–24. https://doi.org/10.1186/s40554-015-0013-x
]Search in Google Scholar
[
Orchard, T. (2019). Online dating sites. In A. D. Lykins (Ed.), Encyclopedia of Sexuality and Gender (pp. 1–3). https://doi.org/10.1007/978-3-319-59531-3_18-1
]Search in Google Scholar
[
O’Reilly, C. A., & Chatman, J. A. (1996). Culture as social control: Corporations, cults, and commitment. In B. M. Staw & L. L. Cummings (Eds.), Research in organizational behavior: An annual series of analytical essays and critical reviews (Vol. 18, pp. 157–200). Elsevier Science/JAI Press.
]Search in Google Scholar
[
Rayson, P. (n.d.) Log-likelihood and effect size calculator. http://ucrel.lancs.ac.uk/llwizard.html
]Search in Google Scholar
[
Rayson, P. (2008). From key words to key semantic domains. International Journal of Corpus Linguistics, 13(4), 519–549. https://doi.org/10.1075/ijcl.13.4.06ray
]Search in Google Scholar
[
Rayson P., Berridge D. and Francis B. (2004). Extending the Cochran rule for the comparison of word frequencies between corpora. In Purnelle G., Fairon C., Dister A. (Eds.) Le poids des mots: Proceedings of the 7th International Conference on Statistical analysis of textual data (JADT 2004), Louvain-la-Neuve, Belgium, March 10-12, 2004 (Vol. 2, pp. 926–936). Presses universitaires de Louvain.
]Search in Google Scholar
[
Rayson, P., & Garside, R. (2000). Comparing corpora using frequency profiling. In Proceedings of the workshop on Comparing Corpora, held in conjunction with the 38th annual meeting of the Association for Computational Linguistics (ACL 2000). 1-8 October 2000, Hong Kong (pp. 1–6).
]Search in Google Scholar
[
Rege, A. (2009). What’s love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494.
]Search in Google Scholar
[
Sampson, R. J., & Laub, J. H. (1993). Crime in the making: Pathways and turning points through life. Crime and Delinquency, 39(3), 396–396. https://doi.org/10.1177/0011128793039003010
]Search in Google Scholar
[
Lin, M., Lucas, Jr., H. C., & Shmueli, G. (2013). Too big to fail: Large samples and the p-value problem. Information Systems Research, advance online publication. http://dx.doi.org/10.1287/isre.2013.0480
]Search in Google Scholar
[
Sorell, T., & Whitty, M. (2019). Online romance scams and victimhood. Security Journal, 32(3), 342–361. https://doi.org/10.1057/s41284-019-00166-w
]Search in Google Scholar
[
Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2019). Automatically dismantling online dating fraud. IEEE Transactions on Information Forensics and Security, 15, 1128–1137. https://doi.org/https://doi.org/10.1109/TIFS.2019.2930479
]Search in Google Scholar
[
Syed, M., & Nelson, S. C. (2015). Guidelines for establishing reliability when coding narrative data. Emerging Adulthood, 3(6), 375–387. https://doi.org/10.1177/2167696815587648
]Search in Google Scholar
[
Tan, H. K., & Yoong, D. (2017). Preying on lonely hearts: A systematic deconstruction of an Internet romance scammer’s online lover persona. Journal of Modern Languages, 23(1), 28–40.
]Search in Google Scholar
[
Thesaurus. (2019). Thesaurus.com. Rock Holdings Inc.
]Search in Google Scholar
[
Toma, C. L., & Hancock, J. T. (2010). Looks and lies: The role of physical attractiveness in online dating self-presentation and deception. Communication Research, 37(3), 335–351. https://doi.org/10.1177/0093650209356437
]Search in Google Scholar
[
Toma, C. L., & Hancock, J. T. (2012). What lies beneath: The linguistic traces of deception in online dating profiles. Journal of Communication, 62, 78–97. https://doi.org/10.1111/j.1460-2466.2011.01619.x
]Search in Google Scholar
[
Toma, C. L., Hancock, J.T., & Ellison, N.B. ( 2008). Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin, 34, 1023–1036. https://doi.org/10.1177/0146167208318067
]Search in Google Scholar
[
Weisbuch, M., Ivcevic, Z., & Ambady, N. (2009). On being liked on the web and in the “real world”: Consistency in first impressions across personal webpages and spontaneous behavior. Journal of Experimental Social Psychology, 45(3), 573–576. https://doi.org/10.1016/j.jesp.2008.12.009
]Search in Google Scholar
[
Whitty, M. T. (2015). Mass-marketing fraud: a growing concern. IEEE Security & Privacy, 13(4), 84–87. https://doi.org/10.1109/MSP.2015.85
]Search in Google Scholar
[
Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.07
]Search in Google Scholar
[
Whitty, M. T., & Buchanan, T. (2012). The psychology of the online dating romance scam. https://fido.nrk.no/d6f57fd73b9898b42c8c322c961c8255f-370677fbac5272b71d86047a5359b66/Whitty_romance_scam_report.pdf
]Search in Google Scholar
[
Whitty, M. T., & Joinson, A. (2008). Truth, lies and trust on the Internet. Routledge.
]Search in Google Scholar
[
Zhou, L., Burgoon, J. K., Nunamaker, J. F., & Twitchell, D. (2004). Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13(1), 81–106. https://doi.org/10.1023/B:GRUP.0000011944.62889.6f
]Search in Google Scholar